Computer Commands That Hackers Use

What I am about to tell you should be used primarily for learning and education. Certainly not for any dubious activities. It is possible to connect to another computer through the internet and browse through their directory structure, update and copy the file etc. Before you can connect you are prompted for a login and password so obviously (and preferably) you need the other person’s explicit co-operation and consent.

If you try to login without consent and approval, it is deemed as hacking. Still, if your intention is neat, meaning you just want to probe and not damage, then you are a white hat hacker. But if you want to hold the other person hostage, then you are deemed a black hat hacker.

Telnet

Let say you have a home computer which acts as the main server, meaning it contains all the data etc. and you use another computer when you travel, then it is possible for you to connect to the home computer using these commands.

Say you know the ip address of the remote machine, then to connect using Telnet use the following address.

c:\telnet ipaddress

c:\telnet 123.123.123.123

Telnet uses a specific port to connect – Port 23. So before we can connect, we need to ensure that this port is open and accessible.

To check for this and other open ports, there is another cool utility available.

Nmap:

Nmap is fairly easy to install and ridiculously simple to use. This utility was in fact shown being used in the movie Matrix where one of the girl protagonist scans a computer for open ports using Nmap before launching intruding attacks.

So how would you go about using all this to connect to another computer.

Before we can connect using Telnet, we need to scan the remote computer for open telnet ports. Download and install nmap. Enter the ip address of the remote machine and use one of the options available for quick scanning. This utility would give you a list of all the open ports of the remote machine.

IP Address:

You can find the IP address by executing the command ipconfig in the command prompt window. Remember the ipaddress that you see locally might be different from what shows up on the internet because your ISP alots a mirror address. The question is how do you go about finding the IP address of the other person? Either the person tells you you dig it out yourself. Lets say the other person uses Yahoo mail. If you have that person respond you using Yahoo mail, then you can view the originating IP address using the email headers.

FTP :

This abbreviation stands for File Transfer Protocol and does exactly that. Telnet may allow you to enter another machine but you cannot copy or put files there from the local machine to the remote machine. To do that you use something like FTP. This utility uses port 21 so you need to make sure its open and accessible. You can use the same id/passwd as Telnet for using this utility.

Netstat :

Netstat tells you the active and passive network connections to your computer. Execute this command in the command prompt of your computer while you have Google search engine open in the browser. See the connection to Google show up in the command prompt when you execute this command. Also, use something like c:\netstat -n. This will convert all the addresses to their numeric value i.e. IP addresses.

You can find the help on executing the all the above commands by using a ‘-h’ in front of the command. For instance, to find out all the options available, run Netstat like:

c:\netstat -h

After you login, what all you can do is a topic of another discussion. Good luck trying all this.

Prostofine is usually a carefully formulated remedy with high dose saw palmetto extract and important herb to deliver optimal prostate health. It’s specifically cure for any swollen prostate. That plagues one inch every two men older than 60. BPH is really a non cancerous growth from the prostate akin. If your prostate grows in mature men, it pinches the urethra, or urine tube, and problems begin, including painful urination and frequent nighttime trips for the bathroom.

Nice blog mate, hope you’re getting ready for the coming crash! The hammer is going to drop soon. The economy is going to sink before August 2013 (this is when the Federal Reserve’s 100 Year Charter expires). Spread the word and stay safe. Peace.

If you’re still on the fence: grab your favorite earphones, head down to a Best Buy and ask to plug them into a Zune then an iPod and see which one sounds better to you, and which interface makes you smile more. Then you’ll know which is right for you.

Hello there! This post could not be written any better! Reading this post reminds me of my good old room mate! He always kept talking about this. I will forward this article to him. Pretty sure he will have a good read. Many thanks for sharing!

Greetings from Carolina! I’m bored to death at work so I decided to check out your website on my iphone during lunch break. I really like the knowledge you provide here and can’t wait to take a look when I get home. I’m shocked at how fast your blog loaded on my cell phone .. I’m not even using WIFI, just 3G .. Anyhow, great site!

I know this in the event that off theme but I’m looking at starting my blog and was wondering what all must get setup? I’m assuming creating a blog just like yours would likely cost a fairly penny? I’m not to internet sensible so I am not 100% certain. Any suggestions or advice would be greatly treasured. Many cheers

Max Bust 36 is an herbal breast enlarging supplement. It is marketed as an alternative to surgery that produces larger, more natural-looking breasts when combined with the company’s special massage techniques. The ingredients are mostly phytoestrogens, including asperagus racemosus, ashwagandha, licorice, pueraria, berberis, and several other herbs.

Its such as you learn my thoughts! You seem to know a lot about this, like you wrote the ebook in it or something. I think that you simply could do with some p.c. to force the message house a bit, however instead of that, this is magnificent blog. An excellent read. I’ll certainly be back.

Just desire to say your article is as surprising. The clarity in your submit is just excellent and that i can suppose you are knowledgeable on this subject. Well along with your permission allow me to clutch your RSS feed to keep up to date with coming near near post. Thank you one million and please keep up the enjoyable work.

Howdy I am so excited I found your blog, I really found you by error, while I was browsing on Askjeeve for something else, Nonetheless I am here now and would just like to say cheers for a tremendous post and a all round enjoyable blog (I also love the theme/design), I donâ€™t have time to look over it all at the minute but I have saved it and also added in your RSS feeds, so when I have time I will be back to read more, Please do keep up the superb job.

The Free Acai Berry is a small, dark berry found in the Amazon that offers amazing health benefits, including weight loss. The berry itself resembles a grape but with a larger seed at the center. The Acai Berry can be found in a stunning array of health foods and supplements. One of the reasons the acai berry is so sought after as a health food is it is considered to have the highest antioxidant concentration of any other food.

5 Hydroxytryptophan, or 5 HTP, is a naturally occurring amino acid. It is used as a precursor to serotonin, a neurotransmitter found in your stomach and central nervous system that regulates mood, appetite, and sleep among other things. 5-HTP is not usually found in the food that we eat but is found in supplement form. Currently, 5-htp supplements are marketed as an antidepressant, appetite suppressant and sleep aid. It is also used for the home treatment of ringing ears, fibromyalgia, panic attacks and chronic headaches.

Menohelp is a natural herbal formula that has been designed to help woman through the menopause. It works by using the naturally occurring phytoestrogens in the Menohelp formula to work over a period of time to help support a balanced level of female hormones.

His or her shape of unrealistic tats were initially threatening. Lindsay utilized gun 1st basic, whereas this girl snuck outside by printer ink dog pen. I used absolutely positive the all truly on the shade, with the tattoo can be taken from the body shape. make an own temporary tattoo

Between me and my husband we’ve owned more MP3 players over the years than I can count, including Sansas, iRivers, iPods (classic & touch), the Ibiza Rhapsody, etc. But, the last few years I’ve settled down to one line of players. Why? Because I was happy to discover how well-designed and fun to use the underappreciated (and widely mocked) Zunes are.

When I initially left a comment I seem to have clicked the -Notify me when new comments are added- checkbox and now every time a comment is added I get 4 emails with the same comment. Perhaps there is a way you can remove me from that service? Kudos!

But along with its popularity emerged the particular rumors with regards to it has the unwanted side effects. The thought is actually some thing is excellent, and then there has to be anything in the factor that brings the exact opposite impulse. This is often among the list of ideas which the not-so-convinced individuals intend.

I have observed that in the world of today, video games are the latest craze with children of all ages. There are times when it may be impossible to drag your kids away from the games. If you want the best of both worlds, there are many educational vid…